Author:Moepya, SO; Akhoury, SS; Nelwamondo, Fulufhelo VDate:Dec 2014In recent years, data mining techniques have been used to identify companies who issue fraudulent financial statements. However, most of the research conducted thus far use datasets that are balanced. This does not always represent reality, ...Read more
Author:Veerasamy, Namosha; Mokhonoana, PM; Vorster, JDate:Jul 2006This paper proposes the use of a data mining techniques to analyse the data recorded by the honeypot. This data can also be used to train Intrusion Detection Systems (IDS) in identifying attacks. Since the training is based on real data it ...Read more
Author:Marivate, Vukosi N; Moiloa, PDate:Nov 2016The increasing prevalence of Social Media platform use has brought with it an explosion of new user generated public data. This data is centered around many, diverse topics. One theme of interest is how one can tap into the public safety and ...Read more
Author:Tugizimana, F; Steenkamp, Paul A; Piater, LA; Dubery, IADate:Nov 2016Untargeted metabolomic studies generate information-rich, high-dimensional, and complex datasets that remain challenging to handle and fully exploit. Despite the remarkable progress in the development of tools and algorithms, the “exhaustive” ...Read morecb
Author:Machaka, P; Nelwamondo, Fulufhelo VDate:Aug 2016This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service ...Read more
Author:Marivate, Vukosi NDate:Nov 2015The use of social media data to gain insights into public phenomena is a potentially powerful tool. We present the use of social media data analysis, connected with crime and public safety incidents, to better understand reoccurring topics ...Read more
Author:Featherstone, CoralDate:Nov 2013Could social media, and in particular, microblogs such as Twitter, play a part in helping to track criminal movement? The aim of this paper is to narrow the focus of this broader problem of using social media to crowdsource information to ...Read more
Author:Harmse, Henriette; Britz, Katarina; Gerber, Aurona JDate:Sep 2018The W3C standardized Semantic Web languages enable users to capture data without a schema in a manner which is intuitive to them. The challenge is that, for the data to be useful, it should be possible to query the data and to query it ...Read more
Author:Featherstone, CoralDate:May 2013Being able to identify and predict crime trends or track criminal movement would help anyone interested in preventing criminal activity or being able to assess where crime enforcement is needed, particularly in crimes where constant policing ...Read more
Author:Madala, NE; Tugizimana, F; Steenkamp, PA; Piater, LA; Dubery, IADate:Mar 2013Ultra high-performance liquid chromatography hyphenated to mass spectrometry (UHPLC-MS) technologies has been widely applied in metabolomics, and the high resolution and peak capacity thereof are only some of the key aspects that are exploited ...Read more
Author:Venter, JP; De Waal, A; Willers, NDate:Jan 2007Forensic analysis requires a keen detective mind, but the human mind has neither the ability nor the time to process the millions of bytes on a typical computer hard disk. Digital forensic investigators need powerful tools that can automate ...Read more